Welcome!


From the Blogosphere

My favorite writer, Gil Press, sums it up with, “It’s Official: The Internet Of Things Takes Over Big Data As The Most Hyped Technology” where he talks about how Gartner released its latest Hype Cycle for Emerging Technologies, and how big data has moved down the “trough of disillusion...
More and more Web sites and applications are being moved from Apache to nginx. While Apache is still the number one HTTP server with more than 60% on active Web sites, nginx has now taken over the 2nd place in the ranking and relegated Microsoft’s IIS to 3rd place. Among the top 10.000...
If you’ve been paying close attention lately you’ll know that the “Internet of Things” has become one of the technology industry’s biggest buzz phrases. It’s not hard to figure why. The internet has been around for the last twenty years and it has truly revolutionized our lives, the wa...
The goal of any DevOps solution is to optimize multiple processes in an organization. And success does not necessarily require that in executing the strategy everything needs to be automated to produce an effective plan. Yet, it is important that processes are put in place to handle a ...
User Experience (UX), in networking is a tricky thing. It’s not just about the direct user interaction of a particular feature or of a particular product. Over at Packet Pushers, we see many blog entries reviewing network products. Time and time again, they show us that UX encompass...
Kirk Byers at SDN Central writes frequently on the topic of DevOps as it relates (and applies) to the network and recently introduced a list of seven DevOps principles that are applicable in an article entitled, "DevOps and the Chaos Monkey. " On this list is the notion of reducing var...
The focus of a BI professional in an organization is to help get the right information to the right decision makers at the right time. In modern times, Big Data analytics has been one of the primary sources of business intelligence acquisition. Tools like Hadoop have revolutionized the...
Some time ago I blogged that Java Swing should be deprecated and replaced with JavaFX. In this blog I’ll show a piece of JavaFX namely event handlers and binding. I’ve created a simple Sign In window with a GridPane layout (it’s JavaFX equivalent of Swing’s GridBagLayout). I’m not goin...
If you Google “detachable computing” today you will mostly get a selection of links relating to removable storage media. It’s a trend that’s slowly changing, but detachable computing is also coming closer to meaning the use of laptop devices that function and fully working laptops wit...
Application delivery, as defined as its own little corner of the network industry, has been fairly focused on assuring the performance, security and availability of applications since its inception back around 2003. Oh, the ways in which those three core tenets have been supported by a...
If you listen to the persistent murmur in the market surrounding the Internet of Things right now, you'd believe that it's all about sensors. Sensors and big data. Sensors that monitor everything from entertainment habits to health status to more mundane environmental data about your h...
Marc Andreessen famously stated in 2011 that “software is eating the world”. The world runs on software defined businesses. These businesses realize that in order to be efficient and stay ahead of the competition they must innovate or they will die. Technology is no longer secondary to...
Of course, IoT is in the midst of a major hype cycle, so there’s a lot of industry buzz about IoT, along with a thousand interpretations of the term. As IT prognosticator Jason Bloomberg points out in a recent post, “the IoT explosion is rather curious if you think about it, as the Int...
A key development for the Internet of Things will be the evolution and emergence of the ‘Cloud Name System’, a directory system for Cloud applications in the same way DNS (Domain Name System) works for the web and email. Lori MacVittie wrote a while back about the need for an ‘SNS’ ...
When people talk about Big Data, the emphasis is usually on the Big. Certainly, Big Data applications are distributed largely because the size of the data on which computations are executed warrants more than a typical application can handle. But scaling the network that provides conne...
If you've had to test one of today's composite applications, you know that "access" has become one of the most daunting barriers to SDLC acceleration. Whether we're talking about access to dev/test environments or access to dependent applications, the ability to pull all the required p...
In Part 1, I looked at what could be behind Facebook’s acquisition of WhatsApp and subsequent purchase of Oculus Rift. How are these seemingly different acquisitions related? There is no question that both Facebook and Google are in a race to build the next-generation computing/communi...
The other day I found myself in a discussion with a prospect regarding the merits of capturing complete stack traces for every transaction that flowed through their production system. You see AppDynamics doesn’t do that; we capture problematic business transactions, and this bloke seem...
Good morning! Or evening, if you happen to be reading this on the other side of the world. Our topic for today is the internet. What? You already know about the internet? No, no, I don’t mean that internet, the boring old one you use to access YouTube and send Facebook updates, e...
I was recently reading Freakonomics’ authors Steven D. Levitt & Stephen J. Dubner’s latest book, Think Like a Freak, and passed over a quote that really resonated with me: So rather than address their root causes, we often spend billions of dollars treating the symptoms and are left t...
If LinkedIn profiles are any indication, User Experience (frequently shortened to UX) is the new orange. Indeed, across all manners of technology, there is an increasing focus on improving user experience. Driven in part by Apple’s success on the consumer side, it would appear that IT ...
OTT and Operator partnerships are becoming more commonplace, with new joint deals being announced every week. Some operators are still not ready to fully embrace this model - why? Operators understand the benefits of the partnership model: the competitive relationship between OTT and ...
The supply chain is evolving, and buyers need to analyze and predict, but also to manage risk. When Capgemini's business information management (BIM) practices unit needed to provide big data capabilities to its insurance company customers, it needed to deliver the right information t...
As revenues from traditional voice and messaging channels continue to dwindle, operators are reassessing their role in the digital communication value chain, and defining what value they can bring to their customers. Of course "customers" increasingly includes partners as well as end ...
On the one hand, the BYOX trends that drive cloud service adoption and worker self-enablement are transforming traditional IT into a User-Centric IT model that focuses on empowering and enabling workers. On the other hand, the free-wheeling nature of the cloud and the regular news of ...
Did you read that Uber, the mobile application company, received $1.2 billion in additional VC investment this month? Why would investors be willing to invest so much? Investors believe that Uber is among a group of mobile app companies capable of disrupting entire industries. They are...
Retailing has always been hard, but it is getting even harder. Brick and mortar stores are struggling to get people into their buildings to see and buy their products. Even when customers enter the store and look at the products, they often reach for their smartphone to check prices ...
In this fast changing world of transformation, digital transformation, the rules of business are being changed before our eyes due to the impact of mobile technologies, big data, social media, the Internet of Things, cloud computing, etc. The strategies of yesteryear are no longer del...
I'll explain the difference between two major categories in in-memory computing: In-Memory Database and In-Memory Data Grid. A few months ago, I spoke at the conference where I explained the difference between caching and an in-memory data grid. Today, having realized that many people...
In many industries today the competitive battleground is quickly shifting to the effective use of data to drive marketing, sales, customer support, R&D, and to deliver hyper-personalized user experiences and digital products. These changes are most readily seen in companies that engag...
In production support it is often hard to correlate what might be happening on local servers with what users are reportedly experiencing. In April, the developers for a Java application that handles electronic distribution of scanned mail and electronic faxes were receiving reports tha...
You often hear people say, ‘oh, this is a living document,’ to indicate that the information is continually updated or edited to reflect changes that may occur during the life of the document. Your infrastructure is also living and dynamic. You make changes, updates or upgrades to addr...
A new mobility report from Ericsson projects that the number of net-connected devices will increase by three or four times over the next five years. There were some 200 million machine-to-machine devices online by the end of 2013 — a broad term that describes any device that exchanges ...
How many different solutions do you need in order to implement an enterprise quality mobile solution? I think this is a worthy question. In years past MEAP (mobile enterprise application platform) and MADP (mobile application development platform) vendors tried to cover all of your nee...
BriefingsDirect had an opportunity to uncover more about about such new, agile business services at the recent 2014 Ariba LIVE Conference in Las Vegas when we spoke to Erik Gershwind, President and CEO of MSC Industrial Supply in Melville, New York. MSC has been using the Ariba Networ...
I have taught classes and half-day workshops on mobile and digital strategies in 17 different countries around the world in the past three years. Some of the most interesting discussions during these classes and workshops are around the following topics - the strategies behind the mobi...
Through our more than 200 security algorithms, StealthWatch is able to digest metadata known as NetFlow coming off of switches, routers, and various perimeter security devices to present an actionable, continuous macro level view of what has seeped through the perimeter. Using many of...
I recently came across a blog post on OpenOpsIQ asking the question: "With the introduction of real-time logging, why cant we have a single solution for monitoring the entire stack?" In my opinion, you can! As we have seen lately from a survey we carried out across a sample of the Loge...
If you're an executive that's concerned about the high-cost of proprietary software, you're not alone. If your IT team pushes back whenever Line of Business leaders ask them for feature enhancements that goes beyond the limits of the commercial software packages they've licensed, then ...
Senior executives at progressive companies have been on a mission -- they're raising the bar of expectations for leaders of their significant investment in business technologies. Providing reliable access to IT resources and reporting on system up-time objectives are unlikely to gain r...